General

  • Target

    7eacc41f3752609ee897ba7e698a8df9

  • Size

    334KB

  • Sample

    231219-xrg3sahfhk

  • MD5

    7eacc41f3752609ee897ba7e698a8df9

  • SHA1

    5aa6b0908abd888a6a3e70a0beccc46f6486855e

  • SHA256

    0ce0a69af0371196e136b11b7188cbc1675ef666825c59374488ea407059ec5c

  • SHA512

    65e771eea6465e3e5f10eac729f061d8fbedea1f018f040f8fdc2726dc3f2adc6026c627438d33bd8dd1cc92eaa420c964b965bd598025718336cc6bd48baa3e

  • SSDEEP

    6144:cQCgZhTWGP6qhGEigYvizu0k9YCAowEs6YgK+ajXdUsGq0Gs077:cH6ht6qhUgnC01LHf6dajXmsGq0GxH

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Targets

    • Target

      7eacc41f3752609ee897ba7e698a8df9

    • Size

      334KB

    • MD5

      7eacc41f3752609ee897ba7e698a8df9

    • SHA1

      5aa6b0908abd888a6a3e70a0beccc46f6486855e

    • SHA256

      0ce0a69af0371196e136b11b7188cbc1675ef666825c59374488ea407059ec5c

    • SHA512

      65e771eea6465e3e5f10eac729f061d8fbedea1f018f040f8fdc2726dc3f2adc6026c627438d33bd8dd1cc92eaa420c964b965bd598025718336cc6bd48baa3e

    • SSDEEP

      6144:cQCgZhTWGP6qhGEigYvizu0k9YCAowEs6YgK+ajXdUsGq0Gs077:cH6ht6qhUgnC01LHf6dajXmsGq0GxH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

MITRE ATT&CK Matrix

Tasks